![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.871166 |
Category: | Red Hat Local Security Checks |
Title: | RedHat Update for libxml2 RHSA-2014:0513-01 |
Summary: | The remote host is missing an update for the 'libxml2'; package(s) announced via the referenced advisory. |
Description: | Summary: The remote host is missing an update for the 'libxml2' package(s) announced via the referenced advisory. Vulnerability Insight: The libxml2 library is a development toolbox providing the implementation of various XML standards. It was discovered that libxml2 loaded external parameter entities even when entity substitution was disabled. A remote attacker able to provide a specially crafted XML file to an application linked against libxml2 could use this flaw to conduct XML External Entity (XXE) attacks, possibly resulting in a denial of service or an information leak on the system. (CVE-2014-0191) An out-of-bounds read flaw was found in the way libxml2 detected the end of an XML file. A remote attacker could provide a specially crafted XML file that, when processed by an application linked against libxml2, could cause the application to crash. (CVE-2013-2877) The CVE-2014-0191 issue was discovered by Daniel P. Berrange of Red Hat. All libxml2 users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The desktop must be restarted (log out, then log back in) for this update to take effect. Affected Software/OS: libxml2 on Red Hat Enterprise Linux Desktop (v. 6), Red Hat Enterprise Linux Server (v. 6), Red Hat Enterprise Linux Workstation (v. 6) Solution: Please Install the Updated Packages. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2013-2877 BugTraq ID: 61050 http://www.securityfocus.com/bid/61050 Bugtraq: 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities (Google Search) http://www.securityfocus.com/archive/1/534161/100/0/threaded Debian Security Information: DSA-2724 (Google Search) http://www.debian.org/security/2013/dsa-2724 Debian Security Information: DSA-2779 (Google Search) http://www.debian.org/security/2013/dsa-2779 http://seclists.org/fulldisclosure/2014/Dec/23 http://secunia.com/advisories/54172 http://secunia.com/advisories/55568 SuSE Security Announcement: SUSE-SU-2013:1627 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html SuSE Security Announcement: openSUSE-SU-2013:1221 (Google Search) http://lists.opensuse.org/opensuse-updates/2013-07/msg00063.html SuSE Security Announcement: openSUSE-SU-2013:1246 (Google Search) http://lists.opensuse.org/opensuse-updates/2013-07/msg00077.html http://www.ubuntu.com/usn/USN-1904-1 http://www.ubuntu.com/usn/USN-1904-2 Common Vulnerability Exposure (CVE) ID: CVE-2014-0191 http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html BugTraq ID: 67233 http://www.securityfocus.com/bid/67233 RedHat Security Advisories: RHSA-2015:0749 http://rhn.redhat.com/errata/RHSA-2015-0749.html SuSE Security Announcement: openSUSE-SU-2015:2372 (Google Search) http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html XForce ISS Database: libxml2-cve20140191-dos(93092) https://exchange.xforce.ibmcloud.com/vulnerabilities/93092 |
Copyright | Copyright (C) 2014 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |